Open Access   Article Go Back

A Three-Layer Privacy Preserving Cloud Storage Scheme Based on DNA Computing with Morse code and Zigzag Pattern

Puransingh Chauhan1 , Sachin Chaudhari2 , Rana Syeda3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-12 , Page no. 97-100, May-2019

Online published on May 12, 2019

Copyright © Puransingh Chauhan, Sachin Chaudhari, Rana Syeda . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Puransingh Chauhan, Sachin Chaudhari, Rana Syeda, “A Three-Layer Privacy Preserving Cloud Storage Scheme Based on DNA Computing with Morse code and Zigzag Pattern,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.12, pp.97-100, 2019.

MLA Style Citation: Puransingh Chauhan, Sachin Chaudhari, Rana Syeda "A Three-Layer Privacy Preserving Cloud Storage Scheme Based on DNA Computing with Morse code and Zigzag Pattern." International Journal of Computer Sciences and Engineering 07.12 (2019): 97-100.

APA Style Citation: Puransingh Chauhan, Sachin Chaudhari, Rana Syeda, (2019). A Three-Layer Privacy Preserving Cloud Storage Scheme Based on DNA Computing with Morse code and Zigzag Pattern. International Journal of Computer Sciences and Engineering, 07(12), 97-100.

BibTex Style Citation:
@article{Chauhan_2019,
author = {Puransingh Chauhan, Sachin Chaudhari, Rana Syeda},
title = {A Three-Layer Privacy Preserving Cloud Storage Scheme Based on DNA Computing with Morse code and Zigzag Pattern},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {12},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {97-100},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1053},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1053
TI - A Three-Layer Privacy Preserving Cloud Storage Scheme Based on DNA Computing with Morse code and Zigzag Pattern
T2 - International Journal of Computer Sciences and Engineering
AU - Puransingh Chauhan, Sachin Chaudhari, Rana Syeda
PY - 2019
DA - 2019/05/12
PB - IJCSE, Indore, INDIA
SP - 97-100
IS - 12
VL - 07
SN - 2347-2693
ER -

           

Abstract

With the rapid development of network bandwidth, the volume of user’s data is rising geometrically. User’s requirement cannot be satisfied by the capacity of local machine any more. Therefore, people try to find new methods to store their data. Pursuing more powerful storage capacity, a growing number of users select cloud storage. Storing data on a public cloud server is a trend in the future and the cloud storage technology will become wide spread in a few years. Cloud storage is a cloud computing system which provides data storage and management service. With a cluster of applications, network technology and distributed file system technology, cloud storage makes a large number of different storage devices work together coordinately. Nowadays there are a lot of companies providing a variety of cloud storage services, such as Dropbox, Google Drive, iCloud, Amazon Web Services, etc. These companies provide large capacity of storage and various services related to other popular applications, which in turn leads to their success in attracting humorous subscribers. However, cloud storage service still exists a lot of security problems. The privacy problem is particularly significant among those security issues. In history, there were some famous cloud storage privacy leakage events. For example, in 2018 despite a robust legislation on data protection by UIDAI, Aadhaar numbers and bank details of over 134,000 beneficiaries on Andhra Pradesh Housing Corporation`s website have been leaked. Apples iCloud leakage event in 2014, numerous Hollywood actresses private photos stored in the clouds were stolen. This event caused an uproar, which was responsible for the users’ anxiety about the privacy of their data stored in cloud server.

Key-Words / Index Term

UIDAI (Unique Identification Authority of India), Cloud Computing, Cloud Storage, Anonymity

References

[1] A.Murugan and R.Thilagavathy,” Securing Cloud Data using DNA and Morse code: A Triple Encryption Scheme”, International Journal of Control Theory and Applications (IJCTA), vol.10, pp.31-18, Nov 2017.
[2] Jacob Grasha, and A. Murugan, ”A Hybrid Encryption Scheme using DNA Technology” The International Journal of Computer Science and Communication Security (IJCSCS), vol.3 (2), pp.61-65, Feb 2013.
[3] G. Feng, “A data privacy protection scheme of cloud storage,” vol. 14, no. 12, pp. 174–176, 2015